2,115 research outputs found
On the Benefit of Forward Error Correction at IEEE 802.11 Link Layer Level
This study examines the error distribution of aggregated MPDUs in 802.11n networks and whether or not forward error correction like raptor coding at the link layer would be useful in these networks. Several experiments with Qualcomm 4x4 802.11n hardware were performed. Two devices were used in a data link, while a third device sniffed all transmitted packets. The collected data was analyzed and used to calculate the packet error rate which would be obtained if FEC was used in order to determine whether FEC is useful at the link layer. It is shown that the error distribution of A-MPDUs does not follow the binomial distribution. Because of this, the performance of FEC in real networks is worse than for theoretical cases where a binomial distribution is assumed. Therefore, other ways to decrease the packet error rate have more impact than forward error correction
Cross-layer based erasure code to reduce the 802.11 performance anomaly : when FEC meets ARF
Wireless networks have been widely accepted and deployed in our world nowadays. Consumers are now accustomed to wireless connectivity in their daily life due to the pervasive- ness of the 802.11b/g and wireless LAN standards. Specially, the emergence of the next evolution of Wi-Fi technology known as 802.11n is pushing a new revolution on personal wireless communication. However, in the context of WLAN, although multiple novel wireless access technologies have been proposed and developed to offer high bandwidth and guarantee quality of transmission, some deficiencies still remain due to the original design of WLAN-MAC layer. In particular, the performance anomaly of 802.11 is a serious issue which induces a potentially dramatic reduction of the global bandwidth when one or several mobile nodes downgrade their transmission rates following the signal degradation. In this paper, we study how the use of adaptive erasure code as a replacement of the Auto Rate Feedback mechanism can help to mitigate this performance anomaly issue. Preliminary study shows a global increase of the goodput delivered to mobile hosts attached to an access point
Distributed MAC Protocol Supporting Physical-Layer Network Coding
Physical-layer network coding (PNC) is a promising approach for wireless
networks. It allows nodes to transmit simultaneously. Due to the difficulties
of scheduling simultaneous transmissions, existing works on PNC are based on
simplified medium access control (MAC) protocols, which are not applicable to
general multi-hop wireless networks, to the best of our knowledge. In this
paper, we propose a distributed MAC protocol that supports PNC in multi-hop
wireless networks. The proposed MAC protocol is based on the carrier sense
multiple access (CSMA) strategy and can be regarded as an extension to the IEEE
802.11 MAC protocol. In the proposed protocol, each node collects information
on the queue status of its neighboring nodes. When a node finds that there is
an opportunity for some of its neighbors to perform PNC, it notifies its
corresponding neighboring nodes and initiates the process of packet exchange
using PNC, with the node itself as a relay. During the packet exchange process,
the relay also works as a coordinator which coordinates the transmission of
source nodes. Meanwhile, the proposed protocol is compatible with conventional
network coding and conventional transmission schemes. Simulation results show
that the proposed protocol is advantageous in various scenarios of wireless
applications.Comment: Final versio
On the benefits of Cross Layer Feedback in Multi-hop Wireless Networks
Wireless networks operate under harsh and time-varying channel conditions.
In wireless networks the time varying channel conditions lead to variable SINR and high BER.
The wireless channel is
distinct from and more unpredictable than the far more reliable wireline channel.
{\em Cross layer feedback} is a mechanism where layers provide {\em selective} information to other
layers to boost the performance of wireless networks.
{\em Cross layer feedback} can lead to a tremendous increase in the performance
of the TCP/IP stack in wireless networks, and an increase in the user's satisfaction level.
However, it is possible that naive feedbacks (or optimizations) can work non-coherently;
therefore, these can negatively effect the performance of the TCP/IP stack. In this paper, we holistically analyze
each layer of the TCP/IP stack, and propose possible Cross layer feedbacks which work coherently. The proposed Cross layer
feedbacks can greatly enhance the performance of the TCP/IP stack in wireless networks
Infrastructure dependent wireless multicast - the effect of spatial diversity and error correction
The use of multiple Access Points (APs) with one AP placed at the middle of a coverage area and the remaining placed at the edge may reduce the Packet Error Rate (PER) experienced by a group of multicast receivers. This paper shows that Spatial Diversity can augment the channel quality experienced especially by those nodes which are located farther from the Master AP, i.e. the AP at the middle, however this study also demonstrates the need for error correction scheme. The aim of this analysis is to propose a means of enhancing the infrastructure end of an IEEE 802.11n Wireless Local Area Network (WLAN), such that multicast data can be delivered reliably in order to guarantee that the received video has an adequate Peak Signal to Noise Ratio (PSNR), but with the constraint that the Medium Access Control (MAC) and the Physical (PHY) layer of the receivers are not modified, hence a legacy IEEE 802.11n node may join the multicast group and experience good Quality of Service.peer-reviewe
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- …